Tadayoshi Kohno
#122,197
Most Influential Person Now
Cryptographer
Tadayoshi Kohno's AcademicInfluence.com Rankings
Tadayoshi Kohnocomputer-science Degrees
Computer Science
#6680
World Rank
#7040
Historical Rank
Database
#6157
World Rank
#6385
Historical Rank

Download Badge
Computer Science
Tadayoshi Kohno's Degrees
- Bachelors Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Tadayoshi Kohno Influential?
(Suggest an Edit or Addition)According to Wikipedia, Tadayoshi Kohno is an American professor and scholar in the fields of data and computer security. He is the Associate Director of Diversity, Equity, Inclusion & Access, and Professor of Computer Science & Engineering at the Paul G. Allen School of Computer Science & Engineering at the University of Washington.
Tadayoshi Kohno's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Comprehensive Experimental Analyses of Automotive Attack Surfaces (2011) (1450)
- Robust Physical-World Attacks on Deep Learning Visual Classification (2018) (1268)
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions (2005) (931)
- Remote physical device fingerprinting (2005) (775)
- Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses (2008) (769)
- Analysis of an electronic voting system (2004) (611)
- Robust Physical-World Attacks on Deep Learning Models (2017) (512)
- Vanish: Increasing Data Privacy with Self-Destructing Data (2009) (440)
- Detecting and Defending Against Third-Party Tracking on the Web (2012) (427)
- Security and Privacy for Implantable Medical Devices (2008) (393)
- Experimental Security Analysis of a Modern Automobile (2010) (362)
- Low-resource routing attacks against tor (2007) (357)
- Cryptography Engineering - Design Principles and Practical Applications (2010) (356)
- Shining Light in Dark Places: Understanding the Tor Network (2008) (337)
- A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications (2003) (308)
- Physical Adversarial Examples for Object Detectors (2018) (303)
- Robust Physical-World Attacks on Machine Learning Models (2017) (277)
- Herding Hash Functions and the Nostradamus Attack (2006) (256)
- User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems (2012) (231)
- Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent (2000) (220)
- Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 (2016) (202)
- Automobile Driver Fingerprinting (2016) (196)
- Security and privacy for augmented reality systems (2014) (196)
- Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive (2003) (190)
- In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies (2014) (176)
- Hash Function Balance and Its Impact on Birthday Attacks (2004) (176)
- TaintEraser: protecting sensitive data leaks using application-level taint tracking (2011) (173)
- PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing (2020) (168)
- Improving wireless privacy with an identifier-free link layer protocol (2008) (161)
- Computer security and the modern home (2013) (159)
- Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security (2008) (156)
- Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing (2007) (152)
- A spotlight on security and privacy risks with future household robots: attacks and lessons (2009) (147)
- Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices (2010) (140)
- A comprehensive study of frequency, interference, and training of multiple graphical passwords (2009) (135)
- CWC: A High-Performance Conventional Authenticated Encryption Mode (2004) (133)
- Authenticated encryption in SSH: provably fixing the SSH binary packet protocol (2002) (123)
- Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm (2004) (121)
- Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety (2010) (120)
- Detecting In-Flight Page Changes with Web Tripwires (2008) (119)
- RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications (2008) (117)
- Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education (2013) (114)
- Trust (and mistrust) in secure applications (2001) (108)
- To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots (2015) (108)
- Strengthening user authentication through opportunistic cryptographic identity assertions (2012) (107)
- World-Driven Access Control for Continuous Sensing (2014) (105)
- Privacy oracle: a system for finding application leaks with black box differential testing (2008) (99)
- Neurosecurity: security and privacy for neural devices. (2009) (94)
- MyTime: Designing and Evaluating an Intervention for Smartphone Non-Use (2016) (93)
- Improving the security and privacy of implantable medical devices. (2010) (92)
- Securing Embedded User Interfaces: Android and Beyond (2013) (89)
- Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice (2008) (89)
- Securing vulnerable home IoT devices with an in-hub security manager (2017) (89)
- Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages (2014) (83)
- Comet: An active distributed key-value store (2010) (81)
- Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications (2008) (80)
- EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond (2009) (75)
- Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users (2018) (73)
- Clinically significant magnetic interference of implanted cardiac devices by portable headphones. (2009) (67)
- Televisions, video privacy, and powerline electromagnetic interference (2011) (66)
- Securing Augmented Reality Output (2017) (65)
- A Review of the Security of Insulin Pump Infusion Systems (2011) (64)
- Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or- how to store ballots on a voting machine (2006) (60)
- Low-Resource Routing Attacks Against Anonymous Systems (2007) (59)
- SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems (2015) (58)
- COVID-19 Contact Tracing and Privacy: Studying Opinion and Preferences (2020) (57)
- Securing RFIDs by Randomizing the Modulation and Channel (2015) (57)
- Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs (2008) (56)
- Physical Access Control for Captured RFID Data (2007) (55)
- CovertBand: Activity Information Leakage using Music (2017) (54)
- Keypad: an auditing file system for theft-prone devices (2011) (53)
- How to Safely Augment Reality: Challenges and Directions (2016) (52)
- Satellite: Joint Analysis of CDNs and Network-Level Interference (2016) (52)
- Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation (2006) (52)
- Token-based scanning of source code for security problems (2002) (50)
- Avoiding the Top 10 Software Security Design Flaws (2014) (48)
- Experimental analysis of denial-of-service attacks on teleoperated robotic systems (2015) (48)
- Augmented reality: hard problems of law and policy (2014) (46)
- New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms (2004) (46)
- Devices That Tell On You: The Nike+iPod Sport Kit (2006) (45)
- Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case Study of Home Automation Security (2013) (44)
- Attacking and repairing the winZip encryption scheme (2004) (44)
- Lightweight server support for browser-based CSRF protection (2013) (43)
- Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More (2017) (43)
- s ecurity and p rivacy for Implantable medical Devices Protecting implantable medical devices against attack without compromising patient health requires balancing security and privacy goals with traditional goals such as safety and utility. (2008) (42)
- Remote physical device fingerprinting (2005) (40)
- Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default (2009) (40)
- Surreptitiously Weakening Cryptographic Systems (2015) (40)
- Operating System Support for Augmented Reality Applications (2013) (40)
- Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts (2020) (39)
- Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era (2007) (38)
- Privacy Scope: A Precise Information Flow Tracking System For Finding Application Leaks (2009) (38)
- EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond (2008) (36)
- Why would you do that? predicting the uses and gratifications behind smartphone-usage behaviors (2016) (34)
- Computer Security and Privacy for Refugees in the United States (2018) (33)
- Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform (2015) (33)
- How Public Is My Private Life?: Privacy in Online Dating (2017) (33)
- Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things (2020) (33)
- Privacy-preserving network forensics (2011) (33)
- The limits of automatic OS fingerprint generation (2010) (32)
- Note on Attacking Object Detectors with Adversarial Stickers (2017) (32)
- Preliminary Cryptanalysis of Reduced-Round Serpent (2000) (31)
- SeaGlass: Enabling City-Wide IMSI-Catcher Detection (2017) (31)
- The Secure Shell (SSH) Transport Layer Encryption Modes (2006) (29)
- Building Secure Cryptographic Transforms, or How to Encrypt and MAC (2003) (27)
- Rewriting History: Changing the Archived Web from the Present (2017) (27)
- Science fiction prototyping and security education: cultivating contextual and societal thinking in computer security education and beyond (2011) (26)
- Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution (2018) (25)
- Analysis of RMAC (2003) (24)
- Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference (2020) (23)
- New Directions for Self-Destructing Data Systems (2012) (23)
- Exploring ADINT: Using Ad Targeting for Surveillance on a Budget - or - How Alice Can Buy Ads to Track Bob (2017) (23)
- SensorSift: balancing sensor data privacy and utility in automated face understanding (2012) (23)
- COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion (2020) (23)
- Consumer Smart Homes: Where We Are and Where We Need to Go (2019) (22)
- Secure Multi-User Content Sharing for Augmented Reality Applications (2019) (22)
- CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices (2014) (21)
- Analyzing the Use of Quick Response Codes in the Wild (2015) (21)
- The CWC Authenticated Encryption (Associated Data) Mode (2003) (19)
- Computer Security for Data Collection Technologies (2016) (19)
- Experiences Building Security Applications on DHTs (2009) (18)
- User interface toolkit mechanisms for securing interface elements (2012) (18)
- Internet Censorship in Thailand: User Practices and Potential Threats (2017) (18)
- FoggySight: A Scheme for Facial Lookup Privacy (2020) (18)
- Control-Alt-Hack™: a card game for computer security outreach and education (abstract only) (2013) (16)
- Computer security for data collection technologies☆ (2017) (15)
- Bad News: Clickbait and Deceptive Ads on News and Misinformation Websites (2020) (15)
- Arya: Operating System Support for Securely Augmenting Reality (2018) (14)
- The CWC-AES Dual-Use Mode (2003) (14)
- Challenges and New Directions in Augmented Reality, Computer Security, and Neuroscience - Part 1: Risks to Sensation and Perception (2018) (13)
- A theoretical treatment of related-key attacks (2003) (13)
- Analysis of the WinZip encryption method (2004) (13)
- Searchable encryption revisited (2006) (13)
- Polymorphism as a Defense for Automated Attack of Websites (2014) (13)
- What Makes a “Bad” Ad? User Perceptions of Problematic Online Advertising (2021) (12)
- An Interview with RFID Security Expert Ari Juels (2008) (12)
- Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection (2021) (11)
- Enabling Multiple Applications to Simultaneously Augment Reality: Challenges and Directions (2019) (11)
- Augmented reality : A technology and policy primer (2015) (11)
- Designer (2021) (11)
- Accept the Risk and Continue: Measuring the Long Tail of Government https Adoption (2020) (11)
- CovertBand (2017) (10)
- User Experiences with Online Status Indicators (2020) (10)
- Computer Security Risks of Distant Relative Matching in Consumer Genetic Databases (2018) (10)
- Block Cipher Modes (2015) (10)
- Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions (2015) (9)
- Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research (2014) (9)
- Polls, clickbait, and commemorative $2 bills: problematic political advertising on news and media websites around the 2020 U.S. elections (2021) (9)
- Seeing through Obscure Glass (2010) (9)
- Expressing Privacy Policies Using Authorization Views (2007) (9)
- Security and Machine Learning in the Real World (2020) (9)
- Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems (2012) (8)
- Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic (2021) (8)
- Sensor tricorder: what does that sensor know about me? (2011) (7)
- Provably Fixing the SSH Binary Packet Protocol (2002) (7)
- Is Tricking a Robot Hacking (2018) (7)
- Defensive Technology Use by Political Activists During the Sudanese Revolution (2021) (7)
- What Are Biometrics ? (2010) (6)
- Keeping Ahead of Our Adversaries (2016) (6)
- Related-Key and Key-Collision Attacks Against RMAC (2002) (6)
- Display Leakage and Transparent Wearable Displays: Investigation of Risk, Root Causes, and Defenses (2015) (6)
- Disrupting Model Training with Adversarial Shortcuts (2021) (6)
- ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets (2012) (5)
- Security for cyber-physical systems: case studies with medical devices, robots, and automobiles (2012) (4)
- Securing Deployed RFIDs by Randomizing the Modulation and the Channel (2013) (4)
- Low-Resource Routing Attacks Against Anonymous Systems ; CU-CS-1025-07 (2007) (4)
- Are Patched Machines Really Fixed? (2009) (3)
- Per-App Profiles with AppFork: The Security of Two Phones with the Convenience of One (2014) (3)
- Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships (2022) (3)
- Empowering Consumer Electronic Security and Privacy Choices : Navigating the Modern Home (2013) (3)
- SSH transport layer encryption modes (2004) (3)
- Would You Rather: A Focus Group Method for Eliciting and Discussing Formative Design Insights with Children (2021) (3)
- Collaborative Research: NeTS—FIND: Privacy-Preserving Attribution and Provenence (2010) (3)
- Exploring Deceptive Design Patterns in Voice Interfaces (2022) (2)
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface (2007) (2)
- Authenticated encryption in practice : generalized composition methods and the Secure Shell, CWC, and WinZip schemes (2006) (2)
- Exploiting Index Cross-Talk to Modify Variant Calls (2018) (2)
- On the Global Content PMI: Improved Copy-Protected Internet Content Distribution (2002) (2)
- Rethinking Mobile Money Security for Developing Regions (2016) (2)
- Anomaly Detection based on Recursive Least-Square Filter for Robust Intelligent Transportation Systems (2015) (2)
- Toward a Secure Internet of Things: Directions for Research (2020) (2)
- DeadDrop/StrongBox security assessment (2013) (2)
- Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality (2022) (2)
- Introduction to Cryptographic Protocols (2015) (1)
- Excavating Web Trackers Using Web Archaeology (2016) (1)
- Attacking the Diebold Signature Variant – RSA Signatures with Unverified High-order Padding (2009) (1)
- The Secure Channel (2015) (1)
- A Privacy-Focused Systematic Analysis of Online Status Indicators (2020) (1)
- Message Authentication Codes (2015) (1)
- Introduction to Cryptography (2015) (1)
- Authenticated encryption in SSH (2002) (1)
- Standards and Patents (2015) (1)
- Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives (2022) (1)
- Augmented Reality: Challenges and Opportunities for Security and Privacy (2021) (1)
- Consumer Smart Homes (2020) (0)
- Power in Computer Security and Privacy: A Critical Lens (2023) (0)
- “There’s so much responsibility on users right now:” Expert Advice for Staying Safer From Hate and Harassment (2023) (0)
- DNA Sequencing Flow Cells and the Security of the Molecular-Digital Interface (2021) (0)
- Understanding People’s Concerns and Attitudes Toward Smart Cities (2023) (0)
- Implementation Issues (II) (2015) (0)
- {In Earth} Until (Ready) (2023) (0)
- Welcome to the Latest "Off by One" Column (2022) (0)
- The Our Reality Privacy Policy (2022) (0)
- Workshop on usable privacy & security for wearable and domestic ubiquitous devices (UPSIDE) (2014) (0)
- Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance (2022) (0)
- The Context of Cryptography (2015) (0)
- The Dream of PKI (2015) (0)
- On the global content pmi (2002) (0)
- How Language Formality in Security and Privacy Interfaces Impacts Intended Compliance (2023) (0)
- Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription (2023) (0)
- Understanding and Designing for Security and Privacy in Multi-User AR Interactions (2020) (0)
- Key-Collision Attacks Against RMAC (2002) (0)
- Herding Hash Functions and the Nostradamus Attack – DRAFT (2005) (0)
- PACT : P rivacy-Sensitive Protocols A nd Mechanisms for Mobile C ontact T racing (2020) (0)
- Computer Security and the Internet of Things (2016) (0)
- Exploring telerobotic cardiac catheter ablation in a rural community hospital: A pilot study (2022) (0)
- "Dr. Hacker, I Presume?" An Experimentally-based Discussion about Security of Teleoperated Surgical Systems (2014) (0)
- Inferring TV Content from Electrical Noise (2010) (0)
- Towards a Secure IoT: Directions for IoT Research (2020) (0)
- Online Advertising in Ukraine and Russia During the 2022 Russian Invasion (2023) (0)
- Session details: Privacy and security (2008) (0)
- Physical Access Control for Captured Rfid Data Privacy and Utility in Pervasive Architectures (0)
- Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy (2022) (0)
- Teaching Computer Security: Thoughts from the Field (2016) (0)
- Implementation Issues (I) (2015) (0)
- CovertBand : Activity Information Leakage using Music RAJALAKSHMINANDAKUMAR (2015) (0)
- Defensive Technology Use During the 2018-2019 Sudanese Revolution (2022) (0)
- HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 6TH, PROCEEDINGS, 1973, 1ST SUPPLEMENT (0)
- Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations (2023) (0)
- Session details: Cloud security (2009) (0)
- Doctoring Direct-to-Consumer Genetic Tests with DNA Spike-Ins (2022) (0)
- Annotated Bibliography of Expert Reports on Voting Systems Wertheimer, Michael A. Trusted Agent Report: Diebold Accuvote-ts Voting System (report Prepared under Cover of Raba Innovative Solution Cell on Behalf of Maryland General (2007) (0)
- Excerpts From the New Dictionary of Cybersecurity, 2036 (2022) (0)
- Proceedings of the conference on Electronic voting technology (2008) (0)
- Protecting security and privacy (2007) (0)
- Proceedings of the 21st USENIX conference on Security symposium (2012) (0)
- The Buffet Overflow Café (2022) (0)
- The Glowing Bonsai And The Kintsugi Pot (2022) (0)
- Mx. President Has a Brain (2022) (0)
This paper list is powered by the following services:
Other Resources About Tadayoshi Kohno
What Schools Are Affiliated With Tadayoshi Kohno?
Tadayoshi Kohno is affiliated with the following schools: